Team for Research in
Ubiquitous Secure Technology

• Conjunctive, subset, and range queries on encrypted data.

Citation
"• Conjunctive, subset, and range queries on encrypted data.". D. Boneh and B. Waters (eds.), TCC'07, LNCS, 2007.

Abstract
We construct public-key systems that support comparison queries (x > a) on encrypted data as well as more general queries such as subset queries (x in S). These systems also support arbitrary conjunctive queries (P1 and ... and Pn) without leaking information on individual conjuncts. We present a general framework for constructing and analyzing public-key systems supporting queries on encrypted data.

Electronic downloads

Citation formats  
  • HTML
     <a
    href="http://www.truststc.org/pubs/593.html"
    ><i>•	Conjunctive, subset, and range
    queries on encrypted data.</i></a>, D. Boneh and
    B. Waters (eds.), TCC'07, LNCS, 2007.
  • Plain text
     "•	Conjunctive, subset, and range queries
    on encrypted data.". D. Boneh and B. Waters (eds.),
    TCC'07, LNCS, 2007.
  • BibTeX
    @proceedings{BonehWaters07_ConjunctiveSubsetRangeQueriesOnEncryptedData,
        title = {•	Conjunctive, subset, and range queries on
                  encrypted data.},
        editor = {D. Boneh and B. Waters},
        organization = {TCC'07, LNCS},
        year = {2007},
        abstract = {We construct public-key systems that support
                  comparison queries (x > a) on encrypted data as
                  well as more general queries such as subset
                  queries (x in S). These systems also support
                  arbitrary conjunctive queries (P1 and ... and Pn)
                  without leaking information on individual
                  conjuncts. We present a general framework for
                  constructing and analyzing public-key systems
                  supporting queries on encrypted data. },
        URL = {http://www.truststc.org/pubs/593.html}
    }
    

Posted by Jessica Gamble on 16 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.